Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud.

Size: px
Start display at page:

Download "Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud."

Transcription

1 Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud. A.Lakshmi Pavani 1, K.Devi Priya 2 1 M. Tech Student, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Peddapuram, East Godavari District, Andhra Pradesh, India. 2 Sr. Assistant Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Peddapuram, East Godavari District, Andhra Pradesh, India. Abstract: Now a day, cloud computing is becoming more popular and the major problem in cloud computing is security. Many companies such as Amazon, Microsoft are developing cloud computing systems and provide services to large number of users on demand. When we store data in the cloud server some security and privacy issues may take place because many users may use the same server. Some unauthorized users may access the data while storing in the cloud. Unauthorized users may gain the passwords easily because users may not use complicated passwords or may not change the passwords to get multiple services. Hence security enhancement is required such as authentication is provided in this paper. Authentication is the process of checking the identity of the user who is logging on the network. The credentials of the user are compared with the details of authorized users stored in the database; if the user is authorized then he gets the permissions to access the data. Authentication allows the system to identify the user through user id and verify with password. In this paper to provide authentication different levels of authentication centers are available which generates keys to provide security. Encryption algorithm such as AES 256 is used to encrypt the file and store in cloud which provides high security. The evaluated results are implemented using Drive HQ cloud Keywords-Cloud computing, Authentication, Security, Authentication center,sub Authentication centers,aes. I. INTRODUCTION Cloud computing refers to sharing and storing information in the cloud. Sharing resources, software and information over the internet. The data which is stored in the cloud server is maintained by cloud service provider. User can use the information stored in the cloud. There is no need to store the information on our own device. One can access files from any location. Users can download the files from the cloud server to any devices such as laptop, tablet or smart phone etc. The price will change depending upon the service used by the user. For example initial amount of 5Gb is free with icloud for storage of data. For additional storage need to pay fee. Cloud computing simply states delivery of computing resources such as servers, storage, databases, networking, software via internet as pay per use [1]. Advantages of cloud computing are world wide access, more storage, easy set up, automatic updates and reduced cost. Companies which provide the services required for the end users are called cloud service providers. Amazon Web Services, Microsoft Azure, Google Cloud Platform, Adobe, VMware, IBM Cloud, Sales force, Oracle Cloud, Verizon Cloud, Drop box are some of examples of cloud service providers. Microsoft Azure is an operating system of cloud and a platform to develop applications in cloud which is used to provide runtime environment for web applications and distributed applications. Google app engine is a scalable runtime environment used for executing web applications. Three delivery models of cloud computing are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service which are offered based on different services. A. Services of Cloud 1) Infrastructure as a Service (IaaS): This service provides the infrastructure in a virtual environment so that many users can access this service. Resources like Servers, Operating Systems, Virtual Machines, Networks, and Storage etc are provided (e.g. Amazon Web Service, Microsoft Azure). 2) Platform as a Service (PaaS): This service provides the environment in which users can compile and run the programs. This service is mainly used by developers. 3) Software as a Service (SaaS): It provides application software as pay per use to the end users. It is platform independent and not needed to install software on our own device. This service is available to many end users which makes cloud computing cheap (e.g. Google Applications, Sales force [2]). 1130

2 B. Characteristics of cloud computing 1) On demand self service means services such as , applications, server service or network are provided by cloud service providers like Amazon web services, Microsoft, Google etc. 2) Resource polling where polling is grouping of resources. Resource pooling means resources are pooled to serve many end users. Some of the resources are storage, processing and memory etc. Resource pooling leads to high resource utilization rates and economies of scale. 3) Rapid Elasticity in cloud computing is used to provide scalable services. The purpose of elasticity is to avoid over or underprovision. Over provision means assigning large amount of resources than required. Under provision means assigning less resource than required. 4) Measured service means resource usage of Cloud computing can be measured, controlled, and reported. Cloud computing services enable to control and optimise resource usage means pay per use.if one uses more resources need to pay more [3]. The following diagram shows System architecture of cloud computing: Fig.1 Cloud model to store data in the cloud server. C. Assume that, in our application the following users are considered 1) Data owner- Stores the file in the cloud server in the encrypted form. 2) Cloud service provider-provides the storage infrastructure for data owner on payment basis. Cloud service provider coordinates authentication center to verify the authorized users for accessing data from the cloud. 3) Data users- Access data from the cloud server. 4) Authentication Center AuC is trusted by all data owner, data user and cloud service provider which is used to verify whether the requested user is authorized or not. 5) Sub-Authentication Centers- Sub-AuC s are used to generate keys in hierarchical level to provide more security. The remaining sections are organized as follows. Section 2 describes related work. Section 3 provides proposed work. Section 4 shows experimental results. Section 5 contains conclusion. II. RELATED WORK Shamir [4] proposed the concept of Identity Based Encryption which is the public key encryption in which the public keys are attributes of user s identity( address, phone number or biometric data).sender need to know the receiver s identity which is the public key in order to send an encrypted message. Private Key Generator generates the private keys. Receiver authenticates to an authority and obtains private key corresponding to this id. Receiver decrypts the message using private key over secure channel in order to get plain text. The problem with IBE is PKG generates private keys for users so that any message can be decrypted without authorization.pkg becomes too slow process and expensive computationally and must establish secure channel to transfer private keys. Hierarchical identity based encryption was proposed by Horwitz [5][6] which consists of root PKG. Root PKG generates private keys to domain level PKG s who in turn generates private keys to the users in their domains in the next level. Pandey [7] proposed the Attribute Based Encryption. The aim of attribute based encryption is to provide security and access control. Based on attributes the encryption and decryption is performed. It is a public key encryption. The secret key of user and cipher text are dependent on attributes. Cipher text decryption is done if the user key attributes are equal with the cipher text attributes [8]. The problem with ABE is data owner needs to use authorized users public key to encrypt the data. There are two types of ABE 1.Key policy ABE and 2.Cipher text policy ABE. CP-ABE encrypts data based on access control policy over attributes, so that only the 1131

3 users who satisfy this policy can decrypt the data. Hierarchical attribute based encryption[9] is a combination of Hierarchical identity based encryption and cipher text policy attribute based encryption which is used to provide fine grained access control and high performance. HABE combines hierarchical generation of keys from HIBE system and access control property from CP-ABE. The concept of Password Authentication mechanism [10] was proposed by Nancy Victor. This paper explains about how to provide more security using graphical password schemes. Setting a password using images can be performed. If choosing images while setting the password is same as logging into the network then the user is considered as valid and can access the application. The steps performed are entering a number from rolling numbers, entering alphanumeric and finally entering CAPTCHA for providing security. III. PROPOSED WORK In this paper, proposed the authentication, authorization protocol and file encryption scheme to store file in the cloud server and to download the file from the cloud server in the secure way. The proposed scheme describes how to secure the data which is stored at the cloud server by using hierarchical structure. Our Contribution to the proposed work defined as three protocols. A. Authentication protocol B. Authorization protocol. C. File Encryption. Authentication is the process of verifying the identity of the user to check whether user is valid or not. Authorization Protocol is a cryptographic protocol which is used to perform that specifies what type of resources are accessed by the users. As many unauthorized users may steal the identity of someone hence special verification methods are used to find whether the person is genuine or not. There are many types of authentication protocols some of them are password authentication protocol, challenge handshake authentication protocol, extensible authentication protocol. Encryption is the process of converting plain text into cipher text which is difficult to recognize the data when it is encrypted. It is commonly used to protect sensitive data so that only the authorized users can see it. Whenever the data owner wants to upload their file in the cloud server in the encrypted format for the security purpose, prove himself as a authenticated user to the cloud server. Then the cloud server allows the data owner to upload the file. The registration phase is required before login in to the cloud. Only the registered users are able to connect with the cloud. In registration, data owner submits the following parameters like name, password, id, mobile no, address, date of birth, gender, pin code, location, profile picture. By submitting all the fields data owner will be registered successfully and the acceptance is performed by AuC. Now the data owner is able to upload the file in the cloud server. First selects file which he wants to upload and enters file name then encrypt the file. While encrypting it generates a trapdoor and uploads the file in the cloud server. File will be successfully uploaded in the cloud. Trapdoor is used to encrypt the data with various random possibilities for providing more security for data and same procedure is used to decrypt the data. The login of user and uploading file in cloud steps as follows. D. Login 1) User Ensures a) UserName b) Password 2) UserAction: Send (UserName, Password) to AUC 3) AUC Action: a) Authentication center Verifies (Username, password) b) If valid permission granted for uploading the file. E. Uploading the file in cloud The following steps are performed during file uploading 1) Select file<-choose file 2) Filename<-Enter file name 3) Key<-Random trapdoor key 4) Cloud<-Send (Encrypt (file, key)) 1132

4 5) Cloud<-Store (file). F. Key Generation for downloading file Whenever the data user wants to download the file proves him as an authenticated user, after successful authentication sends request to the AuC. Authentication center is mainly used to provide security. It generates keys so that only the authorized users are able to download the file. The AUC maintains hierarchy of Sub-AuC (Low level Authentication centers) for granting permissions to the users for downloading files. The hierarchy of Sub-AuC is maintained for providing strong security to the data and authenticating users. If permissions are provided by authentication center to the user then data user can request the keys. If data user request the key_1 that request will be sent to sub-authentication center2.if user request key_2 that request will be sent to sub-authentication center1.sub-authentication center1 and sub-authentication center2 will generate the keys key_2 and key_1. Data user can download the file by entering the file name, trapdoor, key_1 and key_2.hence the file is downloaded from the cloud server. IV. EXPERIMENTAL RESULTS The proposed work is implemented by java with Drive HQ cloud. The user interface is created with JSP framework and the files which are uploaded by the data owner stored in Drive HQ cloud with an encrypted format. The standard encryption algorithm AES is used to encrypt the file. Drive HQ: Free cloud server Drive HQ is used in this project. The storage space provided by Drive HQ is 1gb.Users can easily upload or download files on Drive HQ cloud storage system using Drive HQ file manager, web browser, ftp service or Drive HQ web dav cloud drive. Users can access files from anywhere at any time. Drive HQ requires signup which consists of username, address and password. If the details are correct one can login and can use the service. A. Home Page 1133

5 B. Data Owner Register Form C. Data Owner Login D. Upload File 1134

6 E. Store File in drive hq Cloud V. CONCLUSION As Cloud computing becoming fastest growing technology, security plays a major role in cloud. Protection of information from theft as well as data leakage and deletion of information from cloud can be avoided by proving security [11]. Some unauthorized users may gain the information from the cloud hence in this paper, proposed user authentication which provides strong security due to verification done by authentication centres. To provide security data should be encrypted first and need to store in the cloud. AES algorithm is used to encrypt file. Whenever data user wants to download the file authentication centres should generate keys in a hierarchical level which provides strong security. The evaluated results are implemented with JSP framework and Drive HQ cloud. VI. ACKNOWLEDGMENT I would like to express my gratitude to my Guide Mrs. K. Devi Priya, M. Tech, Sr. Assistant Professor, without her guidance, this paper is not possible. Her understanding encouragement and personal guidance have provided the basis for this paper. REFERENCES [1] J.Srinivas, K.Venkata Subba Reddy, Dr.A.Moiz Qyser, Cloud Computing Basics, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 5, ISSN : ,July [2] Rahul Bhoyar, Prof.Nitin Chopde, Cloud Computing:Service models,types,database and ssues, Volume 3, Issue 3, ijarcsse, ISSN: X,March [3] Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gong, The Characteristics of Cloud Computing, th International Conference on Parallel Processing Workshops. [4] A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in cryptology. Springer, 1985, pp [5] C. Gentry and A. Silverberg, Hierarchical id-based cryptography, in Advances in cryptologyasiacrypt Springer, 2002, pp [6] J.Horwitz and B.Lynn, Toward hierarchical identity-based encryption, in Advances in CryptologyEUROCRYPT Springer,2002, pp [7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM conference on Computer and communications security. Acm, 2006, pp [8] I. Stojmenovic, Access control in distributed systems: Merging theory with practice, in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011, pp [9] G. Wang, Q. Liu, and J. Wu, Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp [10] Nancy Victor, A Novel Graphical Password Authentication Mechanism, International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 9, September 2014, ISSN: X. [11] M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, Security and privacy in cloud computing: A survey, in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp

7 AUTHORS PROFILE A.Lakshmi Pavani received the B. Tech. Degree in Electronics and communication Engineering from Sri Prakash College of Technology,permanently affiliated to J.N.T.U. Kakinada, Andhra Pradesh, India. Presently working for M. Tech. Degree in Computer Science and Engineering at Aditya Engineering College, affiliated to J.N.T.U. Kakinada, Andhra Pradesh, India. Mrs.K.Devi Priya obtained her M.Tech Degree in Computer Science from Jawaharlal Nehru Technological University,Kakinada.And pursuing Ph.D from JNTUK.She had teaching experience of 10 years. She is currently working as Sr.Assistant Professor in CSE at Aditya Engineering College,Surampalem,Andhra Pradesh,India.She taught subjects like Information Security,Database Management,Big data,hadoop,web Technologies and Operating systems. Her research interests include Cloud Computing,Network Security,Big Data. 1136

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Data Store and Multi-Keyword Search on Encrypted Cloud Data

Data Store and Multi-Keyword Search on Encrypted Cloud Data Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

FORTIFICATION AGAINST PASSWORD GUESSING ATTACKS IN ONLINE SYSTEM

FORTIFICATION AGAINST PASSWORD GUESSING ATTACKS IN ONLINE SYSTEM FORTIFICATION AGAINST PASSWORD GUESSING ATTACKS IN ONLINE SYSTEM V Anusha 1, T Lakshmi Priya 2 1 M.Tech Scholar (CSE), Nalanda Institute of Tech. (NIT), Siddharth Nagar, Guntur, A.P, (India) 2 Assistant

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

SURVEY PAPER ON CLOUD COMPUTING

SURVEY PAPER ON CLOUD COMPUTING SURVEY PAPER ON CLOUD COMPUTING Kalpana Tiwari 1, Er. Sachin Chaudhary 2, Er. Kumar Shanu 3 1,2,3 Department of Computer Science and Engineering Bhagwant Institute of Technology, Muzaffarnagar, Uttar Pradesh

More information

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy

More information

Parameter Sweeping Programming Model in Aneka on Data Mining Applications

Parameter Sweeping Programming Model in Aneka on Data Mining Applications Parameter Sweeping Programming Model in Aneka on Data Mining Applications P. Jhansi Rani 1, G. K. Srikanth 2, Puppala Priyanka 3 1,3 Department of CSE, AVN Inst. of Engg. & Tech., Hyderabad. 2 Associate

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient User

More information

Self Destruction Of Data On Cloud Computing

Self Destruction Of Data On Cloud Computing Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam

More information

ISSN: (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25 RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University

More information

A Methodology for Assigning Access Control to Public Clouds

A Methodology for Assigning Access Control to Public Clouds Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority

More information

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat

More information

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY CONTENT Introduction Problem statements Literature Review Existing system Proposed system Application Conclusion Future work MOTIVATIONS

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Time-Based Proxy Re-encryption Review

Time-Based Proxy Re-encryption Review Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing

Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,

More information

Secure Data Storage in Clouds by Using Decentralized Access Control Scheme

Secure Data Storage in Clouds by Using Decentralized Access Control Scheme Secure Data Storage in Clouds by Using Decentralized Access Control Scheme N. Suneel Kumar 1, A. NarayanaRao 2 M.Tech., (Ph.D.) 1 Computer Science and Engineering, Shree Institute of Technical Education

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A Project Report on MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY

A Project Report on MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY A Project Report on MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY Submitted partial fulfillment of the requirements for the award Of the degree of MASTER OF COMPUTER APPLICATIONS IN COMPUTER

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

Performance Evaluation of Gene based Ontology Using Attribute Selection Methods

Performance Evaluation of Gene based Ontology Using Attribute Selection Methods Performance Evaluation of Gene based Ontology Using Attribute Selection Methods Ch. Uma Shankari #1 T. Sudha Rani *2 # M. Tech. Student Department of Computer Science and Engineering Aditya Engineering

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information

Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing

Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing Rajesham Gajula *1 Dr. Ahmed Abdul Moiz Qyser *2 N. Rajender *3 *1 Assistant Professor, Department

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

DEEP DIVE INTO CLOUD COMPUTING

DEEP DIVE INTO CLOUD COMPUTING International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai

More information

Simulation of Cloud Computing Environments with CloudSim

Simulation of Cloud Computing Environments with CloudSim Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

Comparison of ZKP based Authentication Mechanisms for securing the web server

Comparison of ZKP based Authentication Mechanisms for securing the web server Comparison of ZKP based Authentication Mechanisms for securing the web server Kayathri Devi D #1, Akilan S S *2 # Department of Information technology, Kamaraj College of Engineering and technology Virudhunagar,

More information

Intelligent Terminal System Based on Trusted Platform Module

Intelligent Terminal System Based on Trusted Platform Module American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor

More information

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient

More information

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT

More information

Sharing of PHR s in Cloud Computing

Sharing of PHR s in Cloud Computing 86 Sharing of PHR s in Cloud Computing Dussa Manasa K.Rajesh Khanna In Cse Dept, Vaagdevi Engineering college, Warangal, Andhra Pradesh, India Abstract Personal health records (PHRs) grant patients access

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

A Remote Biometric Authentication Protocol for Online Banking

A Remote Biometric Authentication Protocol for Online Banking International Journal of Electrical Energy, Vol. 1, No. 4, December 2013 A Remote Biometric Authentication Protocol for Online Banking Anongporn Salaiwarakul Department of Computer Science and Information

More information

Optimal Search Results Over Cloud with a Novel Ranking Approach

Optimal Search Results Over Cloud with a Novel Ranking Approach Optimal Search Results Over Cloud with a Novel Ranking Approach 1 Movva Kalpana, 2 JayanthiRao Madina 1 Final MTech student, 2 Assistant professor 1 Department of Software Engineering, SISTAM college,

More information

PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER

PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER PRIVACY PROTECTION OF FREQUENTLY USED DATA SENSITIVE IN CLOUD SEVER T.Pavithra M.E Computer Science And Engineering S.A.Engineering College, Chennai-600077, Tamil Nadu. Mrs.G.Umarani Ph.D Professor & Head

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT K. Karthika Lekshmi 1, Dr. M. Vigilsonprem 2 1 Assistant Professor, Department of Information Technology, Cape Institute

More information

Privacy Protection on Data Self- Destruction System for Cloud Storage Networks

Privacy Protection on Data Self- Destruction System for Cloud Storage Networks ISSN 2395-1621 Privacy Protection on Data Self- Destruction System for Cloud Storage Networks #1 Vaishali Hargude, #2 Jyoti Ohol, #3 Sonal Rahinj, #4 Smita Wangale 1 vaishalihargude95@gmail.com 2 jyotiohol95@gmail.com

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

A simple approach of Peer-to-Peer E-Cash system

A simple approach of Peer-to-Peer E-Cash system A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization

More information

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala

More information

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,

More information

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 6, Issue 7 (April 2013), PP. 23-27 Deploying File Based Security on Dynamic Honeypot

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

Associate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India

Associate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Scheduling

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

Identifying Misuse of Data In Cloud

Identifying Misuse of Data In Cloud Identifying Misuse of Data In Cloud K.S.R. Chaitanya #1, T.Rajendra Prasad *2, # Department of IT, Kakinada Institute of Engineering and Technology korangi,ap,india 1 ksaichaitanya007@gmail.com 2 rajendraprasad.tanukula@gmail.com

More information

A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System

A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System International Journal of Network Security, Vol.19, No.4, PP.559-572, July 2017 (DOI: 10.6633/IJNS.201707.19(4).9) 559 A Secured Access Control Technique for Cloud Computing Environment Using Attribute

More information

E-Voting System based on Mobile using NIC and SIM

E-Voting System based on Mobile using NIC and SIM E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.

More information

Visual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques

Visual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.07-14 Visual Cryptography Scheme with Authentication Using

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Distributed System Framework for Mobile Cloud Computing

Distributed System Framework for Mobile Cloud Computing Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey

More information

Cloud Computing: Security Issues & Solution

Cloud Computing: Security Issues & Solution International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1419-1429 Research India Publications http://www.ripublication.com Cloud Computing: Security

More information

An Approach towards Securing Data in Cloud Computing

An Approach towards Securing Data in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 16-20 www.iosrjournals.org An Approach towards Securing Data in Cloud Computing Miss. V.T. Lanjewar 1, Prof. R.V.Dharaskar

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information